0%

Pershing Technology Services Co.
Information Security Statement

Pershing Technology Services Co., Ltd. (hereinafter referred to as the company) adheres to the information security concept of maintaining the customer’s operating environment, and comprehensively protects and prevents the company’s information system and the data stored, processed, transmitted or disclosed to prevent damage, In the event of theft, leakage, tampering, abuse and infringement, this information security statement is formulated. The relevant information security statement is as follows:


  • 1:

    The company’s management has declared its determination to support information security, continue to improve information security, reduce the possible impact of information security incidents, and protect the rights and interests of customers.

  • 2:

    Salespersons, vendors and their employees and temporary employees who have business dealings with the company must follow the company’s “Information Security Policy” (PTSC-ISMS-SP-001) and related information security regulations. The company’s information assets are all responsible for protecting them from unauthorized access, tampering, destruction or improper disclosure.

  • 3:

    Vendors and their employees who do business with our company are required to cooperate with the company’s information operations continuity plan for regular testing and drills to maintain its availability.

  • 4:

    The development, modification and maintenance of all information systems must comply with relevant information security regulations and comply with the provisions of the company’s “Information Security Policy” (PTSC-ISMS-SP-001).

  • 5:

    All personnel should remain vigilant at all times and report in accordance with relevant procedures when a security incident occurs, security weaknesses are discovered, or there is a risk of violating security policies and regulations.

  • 6:

    The company complies with relevant internal and external laws and regulations, establishes corresponding control procedures, and regularly performs information security review operations to ensure the continued and effective operation of the information security management system.


The issuance of this statement clearly declares that the company attaches great importance to information security. Vendors and their employees and temporary employees who do business with the company should truly understand the information security statement to maintain the company’s information security.

robot
您好!有什麼能為您服務的嗎?
嗨寶